CyberSegurança

CiberSecurity

Get Started. It's Free
or sign up with your email address
CyberSegurança by Mind Map: CyberSegurança

1. Introdução à Cyber Segurança

1.1. Objectivos

1.2. Competências a Adquirir

1.3. Pré-Requisitos

1.4. Programa

1.4.1. MOD1 Therminology

1.4.1.1. Triad CIA

1.4.1.2. Basic Therminology

1.4.1.3. Computer Protocols

1.4.2. MOD2 Mind of a Hacker

1.4.2.1. Hacking Methodology

1.4.2.1.1. Diferents Types Of Hacking

1.4.3. MOD3 Attacks

1.4.3.1. Brute Force Attack

1.4.3.2. DoS & DDoS Attacks

1.4.3.3. Bots and Botnets

1.4.4. MOD4 Malware

1.4.4.1. Antivirus

1.4.4.2. Firewalls

1.4.4.2.1. Encryption

1.4.4.3. Biometrics

1.4.4.4. Authentication Methods

1.4.5. MOD5 Defence

1.4.6. Phishing

1.4.7. MOD6 Informatiosn Security at the Work Place

1.4.8. MOD7 Cyber Warfare and Cyber Attacks Agains Companies

2. MOD1 Therminology

2.1. Triad CIA

2.1.1. Confidenciality

2.1.1.1. Limits access to information

2.1.1.2. Ensure Privacy

2.1.1.3. Set Of Rules to limit access

2.1.1.3.1. Methods

2.1.2. Integrity

2.1.2.1. User Access Controls

2.1.2.2. CheckSums

2.1.3. Available

2.1.3.1. Backups

2.1.3.2. Hardware Maintenance and Repairs

2.1.3.3. Disaster Recovery

2.2. Basic Therminology

2.2.1. Blacklist

2.2.2. Whitelist

2.2.3. Cat fishing

2.2.4. Threat

2.2.5. Exploit

2.3. Computer Protocols

2.3.1. What is?

2.3.2. Http and Https

2.3.2.1. Example of HTTP

2.3.2.2. Example of HTTPS

2.3.3. SSL and SSH

2.3.4. FTP and SFTP

2.3.5. IMAP and SMTP

2.4. Cookies

2.5. TCP/IP

2.5.1. 4 Layers

2.5.1.1. DataLink Layer

2.5.1.2. Internet/Networking Layer

2.5.1.3. Transport Layer

2.5.1.4. Application Layer

2.6. Quiz

3. MOD2 Mind of a Hacker

3.1. What is not Hacking

3.2. Types Of Hackers

3.2.1. White Hat Hacker

3.2.2. Black Hat Hacker

3.2.3. Grey Hat Hacker

3.2.4. Script Kiddie

3.2.5. Hacktivists

3.2.5.1. Anonymous (group) - Wikipedia

3.2.5.2. WikiLeaks

3.2.5.3. TugaLeaks

3.3. The Hacking Methodology

3.3.1. FootPrinting

3.3.2. Scanning

3.3.3. Enumeration

3.3.4. System hacking

3.3.5. Escalation of privilege

3.3.6. Covering tracks

3.3.7. Planting backdoors

3.4. WhoIS Query DNS

3.4.1. https://lookup.icann.org/

3.4.2. DNS.pt

3.5. Social Engineering

3.6. Quiz

4. MOD3 Attacks

4.1. BFA - Brute Force Attack

4.1.1. Prevention

4.1.2. Password Cracking

4.2. Phishing and Spoofing

4.2.1. Prevention

4.2.2. Email Filtering

4.2.3. Phishing Alerts | FraudWatch International

4.3. Bots and Botnets

4.3.1. Bots and Botnets

4.3.2. Prevention

4.4. DoS ans DDoS

4.4.1. Denial Of Service

4.5. Pings

4.5.1. Pings

4.6. MitMas - Man In the middle Attack

4.6.1. Types OF

4.6.1.1. Email Hijacking

4.6.1.2. WIFI Eavesdropping

4.6.1.3. Session Hijacking

4.7. SQL Injection

4.7.1. SQL Injection Attack - Microsoft Security Response Center

4.7.2. Havij

4.7.3. XSS

4.7.4. Prevention

4.7.4.1. Limited Privileges

4.7.4.2. Software Patches

4.7.4.3. Define Data

4.8. Quiz

5. MOD4 Malware

5.1. Virus and Worms

5.1.1. Virus

5.1.1.1. Flash Drives

5.1.1.2. WebSites

5.1.1.3. Email Attachments

5.1.1.4. Word Docs

5.1.1.5. EXE Files

5.1.1.6. Dorment - File System

5.1.2. Worms

5.1.2.1. By System Network Connections

5.1.2.2. Downloaded Files

5.1.3. Preventions

5.1.3.1. Scan Email Attachments

5.1.3.2. AntiVirus anda AntiMlaware Products

5.1.3.3. Restrict Use of USB Drives

5.2. Trojans

5.2.1. Disguised as Legitimate Software

5.2.2. Sophisticated

5.2.3. Don't Self Replicate

5.2.4. 4 Majors

5.2.4.1. BackDoor Trojan

5.2.4.2. Infostealer Trojan

5.2.4.3. Trojan Downloader

5.2.4.4. Trojan DDoS

5.2.5. Prevention

5.2.5.1. Ant-Malware Products

5.2.5.2. Updates

5.2.5.3. Download only from Trusted Websites

5.3. Adware and Spyware

5.3.1. Adware

5.3.2. Spyware

5.3.2.1. KeyLoggers

5.3.2.2. KeyStrokes

5.3.2.3. ScreenShots

5.3.3. Prevention

5.3.3.1. Free Software not only is free

5.3.3.2. SpyWare Scanners

5.4. RansomWare

5.4.1. 1st AIDS Trojan

5.4.2. Locked Until Payment

5.4.3. Encrypt Files

5.4.4. Turn Other PC's to Botnets

5.4.5. Infects using Email Links and Downloads

5.4.6. RansomWare

5.4.6.1. TorrentLocker - 2014

5.4.6.2. CTB Locker - 2014

5.4.6.3. Locky - 2016

5.4.6.4. WannaCry - 2017

5.4.7. Prevention

5.4.7.1. Backup

5.4.7.2. Turn Off External Applications

5.4.7.3. Never Open Emails Click on Suspicous links

5.4.7.4. AntiVirus

5.5. Other Types Of Malware

5.5.1. Rootkits

5.5.2. Browser Hjacker

5.5.3. Rogue Security Software

5.5.4. Curious

5.6. Quiz

6. MOD5 Defences

6.1. Anti-Virus

6.1.1. SandBox

6.1.2. PolyMorphic Virus

6.2. Encryptation

6.2.1. Cypher

6.2.2. Decryption

6.2.3. Cryptography

6.2.4. Symmetric and Asymmetric Key

6.2.4.1. Rivest

6.2.4.2. Shamir

6.2.4.3. Adleman

6.2.4.4. DES

6.2.4.5. AES

6.3. Firewalls

6.3.1. Inbound

6.3.2. OutBound

6.3.3. Packet Filtering

6.3.4. Proxy Service

6.3.5. Stateful Inspection

6.3.6. Kind Of Firewalls

6.3.6.1. Hardware

6.3.6.2. Software

6.4. Biometrics

6.4.1. Identifiers

6.4.1.1. Physiological Characteristics

6.4.1.1.1. Fingerprints

6.4.1.1.2. DNA

6.4.1.1.3. Retina

6.4.1.1.4. Face

6.4.1.1.5. Hand

6.4.1.2. Behavioral Characteristics

6.4.1.2.1. Voice

6.4.1.2.2. Gestures

6.4.1.2.3. Gait

6.5. Factor Authentication Methods

6.5.1. 2 Factor Authentication

6.5.1.1. Knowladge Factor

6.5.1.2. Possesion Factor

6.5.1.3. Inherence Factor

6.5.2. Multi Factor Authentication

6.5.2.1. Time

6.5.2.2. Location

6.6. Honey Pots and DMZ

6.6.1. Honey Pot as a Decoy

6.6.2. DMZ

6.6.2.1. Physical

6.6.2.2. Logical

6.7. Security Wireless Network

6.7.1. WEP - Wired Equivalent Privacy

6.7.2. WPA -Wi-Fi Protected Access

6.7.3. WPA2 - Wi-Fi Protected Acces II

6.8. Password Management

6.8.1. Strong Passwords Definiton

6.8.2. Policy Implementation

6.8.2.1. AD

6.8.2.2. Email

6.9. Quiz

7. MOD6 Information Security at the WorkPlace

7.1. BYOD Management

7.1.1. Risks

7.1.2. BYOD Policy

7.2. MDM - Mobile Device Management

7.2.1. Policy

7.3. Security vs Ease of Acess

7.3.1. Policy

7.4. The dissatisfied employee

8. MOD7 Cyber Warfare and Cyber Attaks Agains Companies

8.1. Examples

8.1.1. DDos - The Attack Against Estonia

8.1.2. The Sony Hack